US20080198769A1 - Method and system for a low-complexity spanning tree algorithm in communication networks - Google Patents

Method and system for a low-complexity spanning tree algorithm in communication networks Download PDF

Info

Publication number
US20080198769A1
US20080198769A1 US11/675,374 US67537407A US2008198769A1 US 20080198769 A1 US20080198769 A1 US 20080198769A1 US 67537407 A US67537407 A US 67537407A US 2008198769 A1 US2008198769 A1 US 2008198769A1
Authority
US
United States
Prior art keywords
network
port
node
loop
loops
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US11/675,374
Other versions
US8902793B2 (en
Inventor
Shr-Jie Tzeng
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Avago Technologies International Sales Pte Ltd
Original Assignee
Broadcom Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Broadcom Corp filed Critical Broadcom Corp
Priority to US11/675,374 priority Critical patent/US8902793B2/en
Assigned to BROADCOM CORPORATION reassignment BROADCOM CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: TZENG, SHR-JIE
Publication of US20080198769A1 publication Critical patent/US20080198769A1/en
Application granted granted Critical
Publication of US8902793B2 publication Critical patent/US8902793B2/en
Assigned to BANK OF AMERICA, N.A., AS COLLATERAL AGENT reassignment BANK OF AMERICA, N.A., AS COLLATERAL AGENT PATENT SECURITY AGREEMENT Assignors: BROADCOM CORPORATION
Assigned to AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD. reassignment AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BROADCOM CORPORATION
Assigned to BROADCOM CORPORATION reassignment BROADCOM CORPORATION TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS Assignors: BANK OF AMERICA, N.A., AS COLLATERAL AGENT
Assigned to AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE. LIMITED reassignment AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE. LIMITED MERGER (SEE DOCUMENT FOR DETAILS). Assignors: AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD.
Assigned to AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE. LIMITED reassignment AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE. LIMITED CORRECTIVE ASSIGNMENT TO CORRECT THE EFFECTIVE DATE PREVIOUSLY RECORDED ON REEL 047229 FRAME 0408. ASSIGNOR(S) HEREBY CONFIRMS THE THE EFFECTIVE DATE IS 09/05/2018. Assignors: AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD.
Assigned to AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE. LIMITED reassignment AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE. LIMITED CORRECTIVE ASSIGNMENT TO CORRECT THE PATENT NUMBER 9,385,856 TO 9,385,756 PREVIOUSLY RECORDED AT REEL: 47349 FRAME: 001. ASSIGNOR(S) HEREBY CONFIRMS THE MERGER. Assignors: AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD.
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4604LAN interconnection over a backbone network, e.g. Internet, Frame Relay
    • H04L12/462LAN interconnection over a bridge based backbone
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/18Loop-free operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/48Routing tree calculation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/48Routing tree calculation
    • H04L45/488Routing tree calculation using root node determination

Definitions

  • Certain embodiments of the invention relate to computer and communication networks. More specifically, certain embodiments of the invention relate to a method and system for a low-complexity spanning tree algorithm in communication networks.
  • Wireless links may be established and torn down quickly and may possess a short life-time; even wired networks are non-stationary and their topology may vary over time since links are constantly being established and terminated.
  • terminals, switches, computers and other forms of network devices or nodes may be connected and disconnected to existing ports or be integrated into a network at any time.
  • networks of any size may contain loops and provide for a mesh-like topology rather than a tree-like topology.
  • Loops may be introduced into the network deliberately in order to provide for redundancy in case of link failure, or unintentionally by overlooking that a node is connected to multiple other nodes that may then form a loop.
  • Ad-hoc and other loosely organized types of networks are inherently mesh networks.
  • a mesh-like topology comprising network loops present a problem for various networking protocols, particularly at Layer 2, the data link layer.
  • a variety of networking functions require information to be broadcast throughout a network. This may typically be achieved by so-called flooding, whereby every switch (or node) forwards a packet or frame intended for broadcast, on all the active links, except for the link on which the packet was received.
  • flooding whereby every switch (or node) forwards a packet or frame intended for broadcast, on all the active links, except for the link on which the packet was received.
  • the broadcast packets will eventually arrive back at the sender and be re-sent over the active links. This leads to an accumulation of packets in the network and may ultimately lead to the collapse of the network due to an excessively large number of broadcast packets. This phenomenon is also referred to as a broadcast storm.
  • the network To avoid these problems, it is necessary for the network to be organized in a tree-like structure, characterized by the property that only one path exists between any two nodes in the network and hence no loops. This may be achieved by overlaying the network with a virtual tree network, electronically disabling the links that would form loops.
  • a tree that includes all the nodes in the network and therefore provides a connection between any two nodes is referred to as a spanning tree, as it spans the network.
  • sophisticated algorithms are employed to construct a tree topology in a manner to optimize the network performance.
  • these algorithms are typically dynamic in order to be able to reconfigure the network in case of topology changes due to movement of nodes or link failures, for example.
  • Such algorithms naturally introduce significant complexity into a network and require substantial computing power in comparison to a network that is static and constructed as a tree structure from the onset.
  • a method and/or system for a low-complexity spanning tree algorithm in communication networks substantially as shown in and/or described in connection with at least one of the figures, as set forth more completely in the claims.
  • FIG. 1 is a diagram illustrating a general communications network, in accordance with an embodiment of the invention.
  • FIG. 2 is a flow chart illustrating the principal functionality of a low-complexity token-based spanning tree algorithm, in accordance with an embodiment of the invention.
  • FIG. 3 shows a flow chart illustrating exemplary operation of a root node for loop prevention and construction of a spanning tree, in accordance with an embodiment of the invention.
  • FIG. 4 is a flow chart illustrating exemplary operation of a non-root node for loop prevention and construction of a spanning tree, in accordance with an embodiment of the invention.
  • FIG. 5 is a diagram of an exemplary network used to illustrate the functionality of the port maps single_link, loop_port and final_prune, in accordance with an embodiment of the invention.
  • Certain embodiments of the invention may be found in a method and system for a low-complexity spanning tree algorithm in communication networks. Aspects of a method and system may comprise preventing loops in a communications network utilizing a distributed sequential algorithm in which there is a single token. Only a network node in possession of this single token may disable a network port. A spanning tree may be generated based on loop prevention. The network ports that may be disabled may be chosen from a port map, where the port map may be obtained by combining a port map identifying ports that are connected to loops with a port map indicating network ports that are to remain enabled. The network ports that are to remain enabled may comprise single link ports. The loop prevention may be initiated by a root node and a token may be generated by the root node when completing the prevention. Loops may be detected by using loop discovery frames. Network nodes may reduce ingress data rate during loop prevention.
  • FIG. 1 is a diagram illustrating a general communications network, in accordance with an embodiment of the invention.
  • a network 100 comprising network nodes 102 , 104 , 106 , 108 , 110 , 112 and 114 , and an enlargement 116 of network node 108 .
  • the enlargement 116 of network node 108 may comprise an exemplary switch 118 with 5 network ports p 0 , p 1 , p 2 , p 3 and p 4 .
  • FIG. 1 physical links illustrating an exemplary set of connections between the network nodes 102 through 114 , and an exemplary set of used links that connect the nodes 102 through 114 .
  • a general data link communications network comprising a plurality of network nodes may be interconnected in a large number of ways.
  • one exemplary set of connections between network nodes 102 through 114 may be illustrated by the solid lines connecting the network nodes. These solid lines may depict physical connections between network nodes that may be, but are not limited to, twisted-pair, coaxial cable, optical fiber or wireless links.
  • a general set of interconnections of network nodes may comprise loops (which may sometimes be referred to as cycles).
  • An exemplary loop may be illustrated by the connection path from network node 102 to network node 104 , to network node 114 and back to network node 102 .
  • a network loop may therefore be characterized as a sequence of connections (that is, a path) between nodes that may lead back to the starting node without the need to cross a link between two nodes twice.
  • a loop introduces multiple paths that may connect a pair of nodes together.
  • Loops may be introduced into a communications network topology 100 both intentionally and accidentally.
  • a network designer may intentionally introduce multiple paths, loops or parallel connections, in order to provide for redundancy in the case of link failure.
  • Loops may introduce problems in a communications network because of the way that data may be transmitted across the communications network by network nodes. Effectively, the presence of loops may lead to instability of the network whereby an ever-larger number of data packets may flood the network, and may eventually lead to a collapse of the network throughput. It may therefore be very important to avoid loops in the communications network. This may be achieved by disabling certain links in the network to create a loop-free network that may connect all the nodes. Such an overlay of used links on top of the physical links may be referred to as a spanning tree network.
  • the data link layer may comprise switches (sometimes referred to as bridges) as illustrated in the enlargement 116 of node 108 .
  • the switch 118 may comprise ports p 0 , p 1 , p 2 , p 3 and p 4 . Ports p 3 and p 4 may not be physically connected in the exemplary network 100 .
  • the port p 0 may connect to the transmission medium that links the network node 108 to the network node 112
  • port p 1 may connect to the transmission medium that links the network node 108 to the network node 110
  • port p 2 may connect to the transmission medium that links the network node 108 to the network node 106 .
  • only port p 1 may remain active at network node 108 , switch 118 .
  • the ports p 0 and p 2 may be disabled since the links associated with these ports may not form part of the spanning tree.
  • the spanning tree may be managed dynamically and may change if the topology of network 100 changes.
  • Some algorithms may be used to automatically find an exemplary spanning tree for a particular communications network, for example spanning tree protocol (STP), per-VLAN spanning tree (PVST), and rapid spanning tree protocol (RSPT).
  • STP spanning tree protocol
  • PVST per-VLAN spanning tree
  • RSPT rapid spanning tree protocol
  • These algorithms may typically find a spanning tree of a network by optimizing a cost functions such that certain properties of the resulting spanning tree may be optimized.
  • the optimizing nature of these algorithms may require significant computing resources and may typically require a dedicated CPU and associated memory in each network node.
  • optimization of the network performance may be less important than the cost and complexity introduced by sophisticated spanning tree algorithms to achieve loop prevention.
  • the data carrying capacity of individual links in smaller networks may be similar and so it may often be insignificant which link in a loop is disabled to prevent a loop.
  • FIG. 2 is a flow chart illustrating the principal functionality of a low-complexity token-based spanning tree algorithm, in accordance with an embodiment of the invention. Referring to FIG. 2 , there is shown a start step 202 , process steps 204 , 206 , 208 , 212 , 220 and 222 , decision steps 210 , 214 , 218 , and 224 , and End steps 216 and 226 .
  • a root node may be identified in step 204 .
  • the root node may be the controlling entity of the algorithm and may be responsible to initiate the spanning tree and to generate a single token that enables the node in possession of the token to prune network branches that may contain loops.
  • Identifying a root node in step 204 may be achieved by selecting the node with the largest or smallest identification number.
  • a suitable identification number may be a Media Access Control (MAC) address at every node. Root identification may, however, be achieved by any suitable algorithm and is not limited to the aforementioned exemplary approach based on MAC addresses.
  • MAC Media Access Control
  • the root node may create a token.
  • the token may be used to indicate which node may be allowed to prune network branches involved in loops by disabling ports at the switch. Hence, one node in possession of the token may disable ports and the algorithm may therefore be sequential in nature. Since the root may itself be in possession of the token after creating the token, the root node may be the first node to prune network branches.
  • a loop prevention timer may be started in step 208 .
  • the loop prevention timer may set the interval between subsequent initializations of the spanning tree algorithm.
  • the LP timer expires in step 210 , the spanning tree process may be reset and restarted. This mechanism may be necessary to periodically restart the pruning process or also to complete the pruning process if it had not completed in the previous spanning tree algorithm interval. Multiple iterations of the algorithm may, for example, be required if multiple ports at some nodes may need to be disabled in order to avoid all loops in the network.
  • the node in possession of the token may commence loop detection and prevention. Initially, the root node may be in possession of the token and may therefore be the active node, as determined in step 212 . The active node may then determine in step 214 whether any of its active ports may be connected to a branch of the network with loops. This may include loops that are not directly occurring at the active node but may be reached through the port in question at the active node, as will be detailed in the description for FIG. 5 . If no loops have been detected in step 214 , the network may be loop-free and the process may be terminated in step 216 .
  • the node may need to determine whether the network branch may be pruned in step 218 . There may be instances when branches may not be pruned by disabling the corresponding ports, because a portion of the network may be cut off from the rest of the network, as described for FIG. 5 . If one or more branches with loops may be pruned in step 218 , one port corresponding to a looped branch may be disabled in step 220 . In the case of multiple branches that may be pruned, the port to be disabled in step 220 may be chosen by any suitable method. Suitable low-complexity choices may be the lowest or highest port number, for example.
  • the active node may pass a token along on a non-disabled port that indicated loops in step 214 .
  • the next node along this path may then capture the token by receiving a token_pass frame and may become the active node in step 212 .
  • a token_pass frame is a type of frame that may be used to pass a token from one node to another.
  • the spanning tree construction algorithm may terminate if no further loops are in the network in step 214 , if the token is recaptured by the root node in step 224 , or if the LP timer expires in step 210 .
  • FIG. 3 is a flow chart illustrating exemplary operation of a root node for loop prevention and construction of a spanning tree, in accordance with an embodiment of the invention.
  • each node may need to be able to be a root node or a non-root node. There may be one root node in the network.
  • FIG. 3 and FIG. 4 are flow charts illustrating an exemplary embodiment of the invention that may be implemented on a network node, whereby FIG. 3 illustrates an exemplary implementation of a root node functionality and FIG. 4 illustrates an exemplary implementation of a non-root functionality.
  • the node may initialize by commencing a root selection process in step 306 .
  • the root selection process will establish one root node in the network. If in step 308 the node finds that it is a root, the node may commence parallel processes with steps 312 , 320 , and 316 , respectively. Alternatively, if in step 308 the node finds that it is not a root node, further actions may be as shown in FIG. 4 , as indicated by the off-page connector 310 . This case may be described in detail for FIG. 4 .
  • the root node may start a loop prevention (LP) timer.
  • LP timer expires in decision step 314 , current processes may be interrupted and the node may restart in decision step 308 .
  • the purpose of the LP timer as described for step 208 in FIG. 2 , may be the periodic launching of the spanning tree algorithm and hence the loop prevention functionality.
  • the LP timer may in general be chosen long enough to avoid interrupting the loop prevention algorithm before it may terminate naturally.
  • the root may send a frame such as a root_beacon frame.
  • the root_beacon frame may be used to signal to the non-root nodes who the current root is and that the non-root nodes may still be connected to the network.
  • the root node may then wait RB seconds in step 318 before sending the next root_beacon frame.
  • the parameter RB may be a variable parameter.
  • a non-root node that has not received any root_beacon frames over a specified period of time may conclude that the network topology may have changed and a new root may need to be selected. This may lead to the non-root node initiating a root selection process in step 306 .
  • the root node may initialize the port maps loop_port and final_prune to a sequence of zeros, and single_link to a sequence of ones in preparation for loop detection and loop prevention.
  • the port maps loop_port, single_link and final_prune may be considered bit words b(N ⁇ 1), b(N ⁇ 2), . . . , b( 0 ), where the number of bits may be equal to the number of ports N at the node and bit b(n) may be assigned to port n. Any other bit assignment may be chosen.
  • the port map loop_port may be used to indicate by logic ‘1’, for example, those ports that may be in looped condition.
  • the port map single_link may be used to indicate by, for example, a logic ‘1’, those ports that may be looped but may not be pruned, and the port map final_prune may be used to indicate, for example, by a logic ‘1’, those ports that are looped and may be pruned.
  • the root node may start a timer loop_disc.
  • the loop_disc timer may be used to define the time period over which the root node may keep listening for loop_discovery frames that may indicate loops in the network.
  • the loop_disc timer may be a variable parameter that may depend on the size of the network.
  • the root node may send out frames such as loop_discovery frames on its active ports in step 324 .
  • the loop_discovery frames may contain a root_ID, which is a root identifier, node_ID, the ID of the node that may be sending the loop_discovery frame (in this case equal to the root_ID), and the number of the local port over which the outgoing frame may be sent, LP_local_port.
  • the transmitted loop_discovery frames may be received by a network node and may then be forwarded on every active port other than the one on which the loop_discovery frame may have been received. This process may be referred to as flooding.
  • the loop_discovery frame may eventually be received again by the transmitting node, the root node, indicating that there may be loops connected to the port from which the original loop_discovery frame may have been transmitted.
  • the root node may switch to receiving mode in step 326 and may listen for any loop_discovery frames that may arrive at any of its active ports.
  • the frame may be discarded and may be handled elsewhere in the root node. If the received frame is one loop_discovery frames transmitted from the root node as identified by the field node_ID, this may indicate that there are loops in the network. In this case, the root node will reduce the port ingress data rate in step 332 .
  • Reducing the ingress data rate of the root node may apply to frames that are not associated with loop discovery, loop prevention and spanning tree construction. This may reduce regular data traffic to a minimum while the looped condition may be resolved. In addition, this may reduce any possible broadcast storms resulting from the looped condition.
  • the ingress data rate may, for example, be reduced by a factor 1/(number of ports of the node).
  • the received loop_discovery frame may contain an LP_local_port field, which may be a field that may contain the active port over which the loop_discovery frame may have been transmitted.
  • LP_local_port may be a field that may contain the active port over which the loop_discovery frame may have been transmitted.
  • the root node may keep track of existing loops by setting the associated bit in the loop_port map to logic ‘1’, in step 334 .
  • the LP_local_port may also be compared with the port at which the loop_discovery frame may have been received.
  • the received port is equal to the LP_local_port number, for example m
  • logic ‘1’ and the current value of the bit b(m) of the single_link port map corresponding to LP_local_port may be combined by a logical ‘AND’, to give the new value of bit b(m) of the single_link port map in step 338 .
  • the received port is not equal to the LP_local_port number, for example m, logic ‘0’ and the current value of the bit b(m) of the single_link port map corresponding to LP_local_port may be combined by a logical ‘AND’, to give the new value of bit b(m) of the single_link port map in step 340 .
  • the single_link port map may contain logic ‘0’ only for those ports for which at least one loop_discovery frame has looped back to a receiving port different from the transmitting port in LP_local_port.
  • the ports that may contain a logic ‘0’ in the corresponding position in the single_link port map may be pruned without dividing the network into disjoint sections, as is explained in detail for FIG. 5 .
  • the loop_disc timer has not expired, the root node may loop back to step 326 and may continue to receive and process loop_discovery frames.
  • the root node may construct the final_prune map from the current single_link and loop_port port maps in step 348 , as described in detail for FIG. 5 .
  • the root_node may disable one of the ports that have logic ‘1’ in the corresponding position in the port map final_prune.
  • the ingress data rate of the root node may be reset to its normal operation data rate in step 352 .
  • the root node may create a token_pass frame and may transmit this frame on one of the remaining looped active ports. Receipt of the token_pass frame by another node may then allow the receiving node to become the active node in the spanning tree construction and loop prevention algorithm. In this manner, the root node may relay the token to another node that may then check for any loops at its ports. This branch of the flow chart may then terminate in step 356 .
  • the root node may continue to send out periodic root_beacon messages in steps 316 and 318 . Eventually, the LP timer in step 314 expires and the above described loop prevention process may recommence in step 308 .
  • FIG. 4 is a flow chart illustrating exemplary operation of a non-root node for loop prevention and construction of a spanning tree, in accordance with an embodiment of the invention.
  • each node may need to be able to be a root node or a non-root node. There may be one root node in the network.
  • FIG. 3 and FIG. 4 are flow charts illustrating an exemplary embodiment of the invention that may be implemented on a network node, whereby FIG. 3 illustrates an exemplary implementation of a root node functionality and FIG. 4 illustrates an exemplary implementation of a non-root functionality.
  • the node determines whether it may be a root node or a non-root node in step 308 . If in step 308 the node is not a root node, the flow chart may continue with the off-page connector 310 that may connect to the off-page connector 460 in FIG. 4 .
  • the non-root node may initially reset the root_beacon timer in step 480 .
  • a root_beacon frame may need to be received periodically by the non-root node to confirm that the identity of the root node may not have changed and that there may not have been any network topology changes. Every time the root node identity is confirmed, the root_beacon timer may be reset in step 480 .
  • the non-root node may verify that the root_beacon timer has not expired. If in step 478 the root_beacon timer has expired, the non-root node will trigger root selection mode 306 via off-page connector 476 , which may connect to off-page connector 304 in FIG. 3 .
  • the non-root node may commence receiving frames on its active ports in step 464 .
  • the non-root may confirm the root_ID that may be contained in the frame with a locally stored root identity in step 466 . If the root_ID received in the received frame is different from the locally stored root identity, there may have been topology changes to the network because the node transmitting the frame may have considered a different node to be the root node.
  • the non-root node may trigger root selection mode in step 306 via off-page connector 476 , which may connect to off-page connector 304 in FIG. 3 .
  • the non-root node may verify whether the received frame may be a root_beacon frame in step 468 . In case of a root_beacon frame, the root_beacon timer in step 480 may be reset. If in step 468 the frame is not a root_beacon frame, the non-root node may verify whether the received frame may be a token_pass frame in step 470 . If the received frame in step 470 is not a token_pass frame, the frame may be a loop_discovery frame by elimination and the loop_discovery frame may be forwarded on active ports of the non-root node different from the receiving port, in step 472 .
  • the node may then commence receiving frames again in step 464 .
  • the non-root node may commence the loop prevention and spanning tree construction algorithm since it may be in possession of the token. Via on-page connectors 474 and 418 , the non-root node may then commence the loop discovery and spanning tree construction process in step 420 . Operation of the loop prevention and spanning tree construction for the non-root node from step 420 to step 454 may be identical to the root node operation described in detail for step 320 to step 354 in FIG. 3 .
  • the non-root node may recommence receiving frames in step 464 , via on-page connectors 456 and 462 .
  • FIG. 5 is a diagram of an exemplary network used to illustrate the functionality of the port maps single_link, loop_port and final_prune, in accordance with an embodiment of the invention.
  • switches 502 , 504 , 506 and 508 comprising network ports p 0 , p 1 and p 2 .
  • the single_link port map may be used to avoid pruning links associated with loops that may result in severing the network into disjoint parts.
  • a loop_discovery frame may be sent out on switch A 502 at port 0 . This loop_discovery frame may be received again at switch A 502 , port 0 after looping from switch B 508 to switch C 506 and back.
  • One exemplary path may be from switch A 502 , port 0 to switch B 508 , port 2 , from switch B 508 , port 1 to switch C 506 , port 1 , from switch C 506 , port 0 to switch B 508 , port 0 , and from switch B 508 port 2 back to switch A 502 , port 0 .
  • switch A 502 may determine that there may be a loop downstream of the transmitting port 0 , as the transmitting port may be identified from the LP_local_port field of the received loop_discovery frame.
  • port 0 may be in a looped condition, it may be seen from FIG. 5 that switch A 502 may not disable port 0 since port 0 may provide the only link to switches B 508 and switch C 506 from switch A 502 .
  • the condition for the switch A 502 to ensure that it may prune a link may be that the loop_discovery frame may be received by at least one port different from the transmitting port. From the network configuration shown in FIG.
  • loop_discovery frames from port 0 at switch A 502 may only be received at port 0 and port 0 may therefore not be disabled.
  • loop_discovery frames sent from port 1 and port 2 of switch A 502 may be received by port 2 and port 1 , respectively.
  • loop_port and final_prune may be initialized to 000, whereby the bits 000 may correspond to port 2 , port 1 , port 0 .
  • the port map single_link may be initialized to 111 whereby the bits 111 correspond to port 2 , port 1 , port 0 .
  • the loop_discovery frames may be sent on active ports p 0 , p 1 and p 2 .
  • the loop_discovery frame sent from port 0 may be received on port 0 .
  • LP_local_port of the received loop_discovery frame may be equal to the receiving port, p 0 .
  • logic ‘1’ may be combined with the rightmost bit of single_link (‘1’) that may correspond to port 0 , by logical ‘AND’. This logical combination will result in logic ‘1’ for the rightmost bit position of the single_link port map. Hence, the single_link port map may remain unchanged and the rightmost bit of single_link may indicate by the logic ‘1’ that port 0 may not be pruned.
  • the loop_discovery frame sent from port 2 of switch A 502 may be received at port 0 of switch D 504 and then forwarded on port 1 of switch D 504 .
  • the loop_discovery frame sent from port 1 of switch A 502 may be received by port 2 of switch A 502 and since LP_local_port may not be equal to the receiving port, the middle bit of the port map single_link may also be set to logic ‘0’. Therefore, the single_link port map of switch A 502 may be 001 after the received loop_discovery frames may have been evaluated. Since loop_discovery frames from some active ports were received on port 0 , port 1 and port 2 , the loop_port map will be set to 111, indicating that port 2 , port 1 , port 0 are in a looped condition. By combining the port maps single_link and loop_port, the port map final_prune may be created.
  • the port map final_prune indicates by logic ‘1’ those ports from which one port may be chosen to be disabled.
  • the condition for a ‘1’ in final_prune for a corresponding port may be that the port is in looped condition and the port may not be a single link.
  • the port map final_prune may be constructed by the following logical combination of the port maps:
  • may denote logical ‘AND’ and overlined may denote negated.
  • single_link may be 001 and loop_port may be 111 and the resulting final_prune port map may be 110, indicating that port 2 and port 1 may be disabled.
  • port 2 and port 1 may however not be disabled at concurrently and hence the port map final_prune may provide a list of ports of which one port may be disabled. For further pruning by disabling ports, a new final_prune map may be constructed, which may account for the changes in network topology due to the previously disabled port.
  • a method and system for a low-complexity spanning tree algorithm in communication networks may comprise preventing loops in a communications network utilizing a distributed sequential algorithm as illustrated in FIG. 2 , FIG. 3 and FIG. 4 and in which there is a single token, as discussed in FIG. 2 .
  • Only a network node in possession of this single token may disable a network port, as shown in step 212 of FIG. 2 .
  • a spanning tree may be generated based on loop prevention.
  • the network ports that may be disabled may be chosen from a port map, where the port map may be obtained by combining a port map identifying ports that are connected to loops with a port map indicating network ports that are to remain enabled.
  • the network ports that are to remain enabled may comprise single link ports, as shown, for example, in steps 338 , 340 and 438 and 440 in FIG. 3 and FIG. 4 .
  • the loop prevention may be initiated by a root node and a token may be generated by the root node when completing preventing. Loops may be detected by using loop discovery frames, shown in steps 324 and 424 .
  • FIG. 3 and FIG. 4 there is shown that network nodes may reduce ingress data rate during loop prevention in steps 332 and 432 , respectively.
  • Another embodiment of the invention may provide a machine-readable storage, having stored thereon, a computer program having at least one code section executable by a machine, thereby causing the machine to perform the steps as described above for a low-complexity spanning tree algorithm in communication networks.
  • the present invention may be realized in hardware, software, or a combination of hardware and software.
  • the present invention may be realized in a centralized fashion in at least one computer system or in a distributed fashion where different elements are spread across several interconnected computer systems. Any kind of computer system or other apparatus adapted for carrying out the methods described herein is suited.
  • a typical combination of hardware and software may be a general-purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the methods described herein.
  • the present invention may also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods described herein, and which when loaded in a computer system is able to carry out these methods.
  • Computer program in the present context means any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following: a) conversion to another language, code or notation; b) reproduction in a different material form.

Abstract

Aspects of a method and system for a low-complexity spanning tree algorithm in communication networks may comprise preventing loops in a communications network utilizing a distributed sequential algorithm in which there is a single token. Only a network node in possession of this single token may disable a network port. A spanning tree may be generated based on loop prevention. The network ports that may be disabled may be chosen from a port map, where the port map may be obtained by combining a port map identifying ports that are connected to loops with a port map indicating network ports that are to remain enabled. The loop prevention may be initiated by a root node and a token may be generated by the root node when completing the prevention. Network nodes may reduce ingress data rate during loop prevention.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS/INCORPORATION BY REFERENCE
  • None.
  • FIELD OF THE INVENTION
  • Certain embodiments of the invention relate to computer and communication networks. More specifically, certain embodiments of the invention relate to a method and system for a low-complexity spanning tree algorithm in communication networks.
  • BACKGROUND OF THE INVENTION
  • In most current communication networks, a large number of nodes are connected through wireless and wired links into a web of interconnections that make up the network topology. Wireless links may be established and torn down quickly and may possess a short life-time; even wired networks are non-stationary and their topology may vary over time since links are constantly being established and terminated. Although changes in the actual hard-wired infrastructure are infrequent, terminals, switches, computers and other forms of network devices or nodes may be connected and disconnected to existing ports or be integrated into a network at any time. Frequently, both intentionally and unintentionally, networks of any size may contain loops and provide for a mesh-like topology rather than a tree-like topology. Loops may be introduced into the network deliberately in order to provide for redundancy in case of link failure, or unintentionally by overlooking that a node is connected to multiple other nodes that may then form a loop. Ad-hoc and other loosely organized types of networks are inherently mesh networks.
  • However, for current network technology, a mesh-like topology comprising network loops present a problem for various networking protocols, particularly at Layer 2, the data link layer. For example, a variety of networking functions require information to be broadcast throughout a network. This may typically be achieved by so-called flooding, whereby every switch (or node) forwards a packet or frame intended for broadcast, on all the active links, except for the link on which the packet was received. Clearly, if there are loops in the network, the broadcast packets will eventually arrive back at the sender and be re-sent over the active links. This leads to an accumulation of packets in the network and may ultimately lead to the collapse of the network due to an excessively large number of broadcast packets. This phenomenon is also referred to as a broadcast storm.
  • To avoid these problems, it is necessary for the network to be organized in a tree-like structure, characterized by the property that only one path exists between any two nodes in the network and hence no loops. This may be achieved by overlaying the network with a virtual tree network, electronically disabling the links that would form loops. Such a tree that includes all the nodes in the network and therefore provides a connection between any two nodes is referred to as a spanning tree, as it spans the network. In some networks, sophisticated algorithms are employed to construct a tree topology in a manner to optimize the network performance. Furthermore, these algorithms are typically dynamic in order to be able to reconfigure the network in case of topology changes due to movement of nodes or link failures, for example. Such algorithms naturally introduce significant complexity into a network and require substantial computing power in comparison to a network that is static and constructed as a tree structure from the onset.
  • Further limitations and disadvantages of conventional and traditional approaches will become apparent to one of skill in the art, through comparison of such systems with some aspects of the present invention as set forth in the remainder of the present application with reference to the drawings.
  • BRIEF SUMMARY OF THE INVENTION
  • A method and/or system for a low-complexity spanning tree algorithm in communication networks, substantially as shown in and/or described in connection with at least one of the figures, as set forth more completely in the claims.
  • These and other advantages, aspects and novel features of the present invention, as well as details of an illustrated embodiment thereof, will be more fully understood from the following description and drawings.
  • BRIEF DESCRIPTION OF SEVERAL VIEWS OF THE DRAWINGS
  • FIG. 1 is a diagram illustrating a general communications network, in accordance with an embodiment of the invention.
  • FIG. 2 is a flow chart illustrating the principal functionality of a low-complexity token-based spanning tree algorithm, in accordance with an embodiment of the invention.
  • FIG. 3 shows a flow chart illustrating exemplary operation of a root node for loop prevention and construction of a spanning tree, in accordance with an embodiment of the invention.
  • FIG. 4 is a flow chart illustrating exemplary operation of a non-root node for loop prevention and construction of a spanning tree, in accordance with an embodiment of the invention.
  • FIG. 5 is a diagram of an exemplary network used to illustrate the functionality of the port maps single_link, loop_port and final_prune, in accordance with an embodiment of the invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • Certain embodiments of the invention may be found in a method and system for a low-complexity spanning tree algorithm in communication networks. Aspects of a method and system may comprise preventing loops in a communications network utilizing a distributed sequential algorithm in which there is a single token. Only a network node in possession of this single token may disable a network port. A spanning tree may be generated based on loop prevention. The network ports that may be disabled may be chosen from a port map, where the port map may be obtained by combining a port map identifying ports that are connected to loops with a port map indicating network ports that are to remain enabled. The network ports that are to remain enabled may comprise single link ports. The loop prevention may be initiated by a root node and a token may be generated by the root node when completing the prevention. Loops may be detected by using loop discovery frames. Network nodes may reduce ingress data rate during loop prevention.
  • FIG. 1 is a diagram illustrating a general communications network, in accordance with an embodiment of the invention. Referring to FIG. 1, there is shown a network 100, comprising network nodes 102, 104, 106, 108, 110, 112 and 114, and an enlargement 116 of network node 108. The enlargement 116 of network node 108 may comprise an exemplary switch 118 with 5 network ports p0, p1, p2, p3 and p4. There is also shown, in FIG. 1, physical links illustrating an exemplary set of connections between the network nodes 102 through 114, and an exemplary set of used links that connect the nodes 102 through 114.
  • A general data link communications network comprising a plurality of network nodes may be interconnected in a large number of ways. In the exemplary network 100, one exemplary set of connections between network nodes 102 through 114 may be illustrated by the solid lines connecting the network nodes. These solid lines may depict physical connections between network nodes that may be, but are not limited to, twisted-pair, coaxial cable, optical fiber or wireless links. As may be seen in FIG. 1, a general set of interconnections of network nodes may comprise loops (which may sometimes be referred to as cycles). An exemplary loop may be illustrated by the connection path from network node 102 to network node 104, to network node 114 and back to network node 102. A network loop may therefore be characterized as a sequence of connections (that is, a path) between nodes that may lead back to the starting node without the need to cross a link between two nodes twice. Alternatively, it may be seen that a loop introduces multiple paths that may connect a pair of nodes together.
  • Loops may be introduced into a communications network topology 100 both intentionally and accidentally. A network designer may intentionally introduce multiple paths, loops or parallel connections, in order to provide for redundancy in the case of link failure. Equally, it may be envisaged that a network end user may accidentally introduce loops into the network topology by connecting a plurality of network nodes to ports of a switch connected to a building backbone network. Loops, however, may introduce problems in a communications network because of the way that data may be transmitted across the communications network by network nodes. Effectively, the presence of loops may lead to instability of the network whereby an ever-larger number of data packets may flood the network, and may eventually lead to a collapse of the network throughput. It may therefore be very important to avoid loops in the communications network. This may be achieved by disabling certain links in the network to create a loop-free network that may connect all the nodes. Such an overlay of used links on top of the physical links may be referred to as a spanning tree network.
  • An exemplary spanning tree is illustrated by the dashed lines in FIG. 1. Hence, only the links indicated by the dashed lines may be used to forward data traffic destined for other network nodes. Such a spanning tree of used network links may ensure that there may be only one active path between any pair of network nodes in the network. In a network, the data link layer may comprise switches (sometimes referred to as bridges) as illustrated in the enlargement 116 of node 108. In this example, the switch 118 may comprise ports p0, p1, p2, p3 and p4. Ports p3 and p4 may not be physically connected in the exemplary network 100. The port p0 may connect to the transmission medium that links the network node 108 to the network node 112, port p1 may connect to the transmission medium that links the network node 108 to the network node 110, and port p2 may connect to the transmission medium that links the network node 108 to the network node 106. Based on the spanning tree overlay, however, only port p1 may remain active at network node 108, switch 118. The ports p0 and p2 may be disabled since the links associated with these ports may not form part of the spanning tree. The spanning tree may be managed dynamically and may change if the topology of network 100 changes.
  • Some algorithms may be used to automatically find an exemplary spanning tree for a particular communications network, for example spanning tree protocol (STP), per-VLAN spanning tree (PVST), and rapid spanning tree protocol (RSPT). These algorithms may typically find a spanning tree of a network by optimizing a cost functions such that certain properties of the resulting spanning tree may be optimized. However, the optimizing nature of these algorithms may require significant computing resources and may typically require a dedicated CPU and associated memory in each network node. For smaller networks like those used, for example, in home networks or small-and-medium-size enterprises (SMEs), optimization of the network performance may be less important than the cost and complexity introduced by sophisticated spanning tree algorithms to achieve loop prevention. For example, the data carrying capacity of individual links in smaller networks may be similar and so it may often be insignificant which link in a loop is disabled to prevent a loop. Hence, it may be of substantial practical interest to employ sub-optimal, low-complexity algorithms that may be capable of autonomous loop prevention in networks.
  • FIG. 2 is a flow chart illustrating the principal functionality of a low-complexity token-based spanning tree algorithm, in accordance with an embodiment of the invention. Referring to FIG. 2, there is shown a start step 202, process steps 204, 206, 208, 212, 220 and 222, decision steps 210, 214, 218, and 224, and End steps 216 and 226.
  • After starting the algorithm in step 202, a root node may be identified in step 204. There may be one root node in the network. The root node may be the controlling entity of the algorithm and may be responsible to initiate the spanning tree and to generate a single token that enables the node in possession of the token to prune network branches that may contain loops. Identifying a root node in step 204 may be achieved by selecting the node with the largest or smallest identification number. A suitable identification number may be a Media Access Control (MAC) address at every node. Root identification may, however, be achieved by any suitable algorithm and is not limited to the aforementioned exemplary approach based on MAC addresses.
  • Once a root node has been identified in step 204, the root node may create a token. The token may be used to indicate which node may be allowed to prune network branches involved in loops by disabling ports at the switch. Hence, one node in possession of the token may disable ports and the algorithm may therefore be sequential in nature. Since the root may itself be in possession of the token after creating the token, the root node may be the first node to prune network branches.
  • As soon as the token has been created in step 206, a loop prevention timer (LP) may be started in step 208. The loop prevention timer may set the interval between subsequent initializations of the spanning tree algorithm. When the LP timer expires in step 210, the spanning tree process may be reset and restarted. This mechanism may be necessary to periodically restart the pruning process or also to complete the pruning process if it had not completed in the previous spanning tree algorithm interval. Multiple iterations of the algorithm may, for example, be required if multiple ports at some nodes may need to be disabled in order to avoid all loops in the network.
  • After the token has been created in step 206, the node in possession of the token, the active node, may commence loop detection and prevention. Initially, the root node may be in possession of the token and may therefore be the active node, as determined in step 212. The active node may then determine in step 214 whether any of its active ports may be connected to a branch of the network with loops. This may include loops that are not directly occurring at the active node but may be reached through the port in question at the active node, as will be detailed in the description for FIG. 5. If no loops have been detected in step 214, the network may be loop-free and the process may be terminated in step 216. If loops have been detected in step 214, the node may need to determine whether the network branch may be pruned in step 218. There may be instances when branches may not be pruned by disabling the corresponding ports, because a portion of the network may be cut off from the rest of the network, as described for FIG. 5. If one or more branches with loops may be pruned in step 218, one port corresponding to a looped branch may be disabled in step 220. In the case of multiple branches that may be pruned, the port to be disabled in step 220 may be chosen by any suitable method. Suitable low-complexity choices may be the lowest or highest port number, for example.
  • In step 222, the active node may pass a token along on a non-disabled port that indicated loops in step 214. The next node along this path may then capture the token by receiving a token_pass frame and may become the active node in step 212. A token_pass frame is a type of frame that may be used to pass a token from one node to another. The spanning tree construction algorithm may terminate if no further loops are in the network in step 214, if the token is recaptured by the root node in step 224, or if the LP timer expires in step 210.
  • FIG. 3 is a flow chart illustrating exemplary operation of a root node for loop prevention and construction of a spanning tree, in accordance with an embodiment of the invention.
  • To achieve semi-autonomous and distributed functionality as described for FIG. 2, each node may need to be able to be a root node or a non-root node. There may be one root node in the network. FIG. 3 and FIG. 4 are flow charts illustrating an exemplary embodiment of the invention that may be implemented on a network node, whereby FIG. 3 illustrates an exemplary implementation of a root node functionality and FIG. 4 illustrates an exemplary implementation of a non-root functionality.
  • After step 302, the node may initialize by commencing a root selection process in step 306. As described for FIG. 2, step 204, the root selection process will establish one root node in the network. If in step 308 the node finds that it is a root, the node may commence parallel processes with steps 312, 320, and 316, respectively. Alternatively, if in step 308 the node finds that it is not a root node, further actions may be as shown in FIG. 4, as indicated by the off-page connector 310. This case may be described in detail for FIG. 4.
  • In step 312, the root node may start a loop prevention (LP) timer. When the LP timer expires in decision step 314, current processes may be interrupted and the node may restart in decision step 308. The purpose of the LP timer, as described for step 208 in FIG. 2, may be the periodic launching of the spanning tree algorithm and hence the loop prevention functionality. The LP timer may in general be chosen long enough to avoid interrupting the loop prevention algorithm before it may terminate naturally.
  • In step 316, the root may send a frame such as a root_beacon frame. The root_beacon frame may be used to signal to the non-root nodes who the current root is and that the non-root nodes may still be connected to the network. The root node may then wait RB seconds in step 318 before sending the next root_beacon frame. The parameter RB may be a variable parameter. As will be described in FIG. 4, a non-root node that has not received any root_beacon frames over a specified period of time, may conclude that the network topology may have changed and a new root may need to be selected. This may lead to the non-root node initiating a root selection process in step 306.
  • In step 320, the root node may initialize the port maps loop_port and final_prune to a sequence of zeros, and single_link to a sequence of ones in preparation for loop detection and loop prevention. The port maps loop_port, single_link and final_prune may be considered bit words b(N−1), b(N−2), . . . , b(0), where the number of bits may be equal to the number of ports N at the node and bit b(n) may be assigned to port n. Any other bit assignment may be chosen. The port map loop_port may be used to indicate by logic ‘1’, for example, those ports that may be in looped condition. The port map single_link may be used to indicate by, for example, a logic ‘1’, those ports that may be looped but may not be pruned, and the port map final_prune may be used to indicate, for example, by a logic ‘1’, those ports that are looped and may be pruned. In step 322, the root node may start a timer loop_disc. The loop_disc timer may be used to define the time period over which the root node may keep listening for loop_discovery frames that may indicate loops in the network. The loop_disc timer may be a variable parameter that may depend on the size of the network. If the size of the network is over a certain size and the loop_disc timer short, there may be insufficient time for a loop_discovery frame to travel around a large loop before the root node cedes to listen for loop_discovery frames. In this case, the root node may mistakenly assume that the network may be loop-free. Setting the loop_disc timer much longer than required by the size of the network may correspondingly slow down the loop prevention and spanning tree algorithm.
  • After starting the loop_disc timer in step 322, the root node may send out frames such as loop_discovery frames on its active ports in step 324. The loop_discovery frames may contain a root_ID, which is a root identifier, node_ID, the ID of the node that may be sending the loop_discovery frame (in this case equal to the root_ID), and the number of the local port over which the outgoing frame may be sent, LP_local_port. The transmitted loop_discovery frames may be received by a network node and may then be forwarded on every active port other than the one on which the loop_discovery frame may have been received. This process may be referred to as flooding. In the case of network loops, the loop_discovery frame may eventually be received again by the transmitting node, the root node, indicating that there may be loops connected to the port from which the original loop_discovery frame may have been transmitted.
  • After the root node may transmit loop_discovery frames on its active ports in step 324, the root node may switch to receiving mode in step 326 and may listen for any loop_discovery frames that may arrive at any of its active ports. In step 328, if a received frame is different from a loop_discovery frame sent by the root node itself, the frame may be discarded and may be handled elsewhere in the root node. If the received frame is one loop_discovery frames transmitted from the root node as identified by the field node_ID, this may indicate that there are loops in the network. In this case, the root node will reduce the port ingress data rate in step 332. Reducing the ingress data rate of the root node may apply to frames that are not associated with loop discovery, loop prevention and spanning tree construction. This may reduce regular data traffic to a minimum while the looped condition may be resolved. In addition, this may reduce any possible broadcast storms resulting from the looped condition. The ingress data rate may, for example, be reduced by a factor 1/(number of ports of the node).
  • The received loop_discovery frame may contain an LP_local_port field, which may be a field that may contain the active port over which the loop_discovery frame may have been transmitted. Hence, there may be loops connected to the port named in LP_local_port and the root node may keep track of existing loops by setting the associated bit in the loop_port map to logic ‘1’, in step 334. Furthermore, in step 336, the LP_local_port may also be compared with the port at which the loop_discovery frame may have been received. If the received port is equal to the LP_local_port number, for example m, logic ‘1’ and the current value of the bit b(m) of the single_link port map corresponding to LP_local_port may be combined by a logical ‘AND’, to give the new value of bit b(m) of the single_link port map in step 338. If the received port is not equal to the LP_local_port number, for example m, logic ‘0’ and the current value of the bit b(m) of the single_link port map corresponding to LP_local_port may be combined by a logical ‘AND’, to give the new value of bit b(m) of the single_link port map in step 340. In this way, the single_link port map may contain logic ‘0’ only for those ports for which at least one loop_discovery frame has looped back to a receiving port different from the transmitting port in LP_local_port. The ports that may contain a logic ‘0’ in the corresponding position in the single_link port map may be pruned without dividing the network into disjoint sections, as is explained in detail for FIG. 5. If in step 342, the loop_disc timer has not expired, the root node may loop back to step 326 and may continue to receive and process loop_discovery frames. When the loop_disc timer in step 342 expires, the root node may construct the final_prune map from the current single_link and loop_port port maps in step 348, as described in detail for FIG. 5.
  • In step 350, the root_node may disable one of the ports that have logic ‘1’ in the corresponding position in the port map final_prune. The ingress data rate of the root node, may be reset to its normal operation data rate in step 352. In step 354, the root node may create a token_pass frame and may transmit this frame on one of the remaining looped active ports. Receipt of the token_pass frame by another node may then allow the receiving node to become the active node in the spanning tree construction and loop prevention algorithm. In this manner, the root node may relay the token to another node that may then check for any loops at its ports. This branch of the flow chart may then terminate in step 356. The root node may continue to send out periodic root_beacon messages in steps 316 and 318. Eventually, the LP timer in step 314 expires and the above described loop prevention process may recommence in step 308.
  • FIG. 4 is a flow chart illustrating exemplary operation of a non-root node for loop prevention and construction of a spanning tree, in accordance with an embodiment of the invention.
  • To achieve semi-autonomous and distributed functionality as described for FIG. 2, each node may need to be able to be a root node or a non-root node. There may be one root node in the network. FIG. 3 and FIG. 4 are flow charts illustrating an exemplary embodiment of the invention that may be implemented on a network node, whereby FIG. 3 illustrates an exemplary implementation of a root node functionality and FIG. 4 illustrates an exemplary implementation of a non-root functionality.
  • After root selection in step 306, described for FIG. 3, the node determines whether it may be a root node or a non-root node in step 308. If in step 308 the node is not a root node, the flow chart may continue with the off-page connector 310 that may connect to the off-page connector 460 in FIG. 4. The non-root node may initially reset the root_beacon timer in step 480. A root_beacon frame may need to be received periodically by the non-root node to confirm that the identity of the root node may not have changed and that there may not have been any network topology changes. Every time the root node identity is confirmed, the root_beacon timer may be reset in step 480. In step 478, the non-root node may verify that the root_beacon timer has not expired. If in step 478 the root_beacon timer has expired, the non-root node will trigger root selection mode 306 via off-page connector 476, which may connect to off-page connector 304 in FIG. 3.
  • In parallel with resetting the root_beacon timer in step 480, the non-root node may commence receiving frames on its active ports in step 464. When a frame is received, the non-root may confirm the root_ID that may be contained in the frame with a locally stored root identity in step 466. If the root_ID received in the received frame is different from the locally stored root identity, there may have been topology changes to the network because the node transmitting the frame may have considered a different node to be the root node. Hence, the non-root node may trigger root selection mode in step 306 via off-page connector 476, which may connect to off-page connector 304 in FIG. 3.
  • If in step 466 the root_ID of the received frame is equal to the locally stored root identity, the non-root node may verify whether the received frame may be a root_beacon frame in step 468. In case of a root_beacon frame, the root_beacon timer in step 480 may be reset. If in step 468 the frame is not a root_beacon frame, the non-root node may verify whether the received frame may be a token_pass frame in step 470. If the received frame in step 470 is not a token_pass frame, the frame may be a loop_discovery frame by elimination and the loop_discovery frame may be forwarded on active ports of the non-root node different from the receiving port, in step 472. The node may then commence receiving frames again in step 464. On the other hand, if the received frame in step 470 is a token_pass frame, the non-root node may commence the loop prevention and spanning tree construction algorithm since it may be in possession of the token. Via on- page connectors 474 and 418, the non-root node may then commence the loop discovery and spanning tree construction process in step 420. Operation of the loop prevention and spanning tree construction for the non-root node from step 420 to step 454 may be identical to the root node operation described in detail for step 320 to step 354 in FIG. 3.
  • After sending the token_pass frame and thereby forwarding the token in step 454, the non-root node may recommence receiving frames in step 464, via on- page connectors 456 and 462.
  • FIG. 5 is a diagram of an exemplary network used to illustrate the functionality of the port maps single_link, loop_port and final_prune, in accordance with an embodiment of the invention. Referring to FIG. 5, there is shown switches 502, 504, 506 and 508, comprising network ports p0, p1 and p2.
  • The single_link port map may be used to avoid pruning links associated with loops that may result in severing the network into disjoint parts. A loop_discovery frame may be sent out on switch A 502 at port 0. This loop_discovery frame may be received again at switch A 502, port 0 after looping from switch B 508 to switch C 506 and back. One exemplary path may be from switch A 502, port 0 to switch B 508, port 2, from switch B 508, port 1 to switch C 506, port 1, from switch C 506, port 0 to switch B 508, port 0, and from switch B 508 port 2 back to switch A 502, port 0. Hence, switch A 502 may determine that there may be a loop downstream of the transmitting port 0, as the transmitting port may be identified from the LP_local_port field of the received loop_discovery frame. However, although port 0 may be in a looped condition, it may be seen from FIG. 5 that switch A 502 may not disable port 0 since port 0 may provide the only link to switches B 508 and switch C 506 from switch A 502. The condition for the switch A 502 to ensure that it may prune a link may be that the loop_discovery frame may be received by at least one port different from the transmitting port. From the network configuration shown in FIG. 5, it may be seen that loop_discovery frames from port 0 at switch A 502 may only be received at port 0 and port 0 may therefore not be disabled. On the other hand, loop_discovery frames sent from port 1 and port 2 of switch A 502 may be received by port 2 and port 1, respectively.
  • An exemplary construction of the port maps loop_port, single_link and final_prune for switch A 502 may be as follows: loop_port and final_prune may be initialized to 000, whereby the bits 000 may correspond to port 2, port 1, port 0. The port map single_link may be initialized to 111 whereby the bits 111 correspond to port 2, port 1, port 0. The loop_discovery frames may be sent on active ports p0, p1 and p2. The loop_discovery frame sent from port 0 may be received on port 0. In this case, LP_local_port of the received loop_discovery frame may be equal to the receiving port, p0. Therefore, logic ‘1’ may be combined with the rightmost bit of single_link (‘1’) that may correspond to port 0, by logical ‘AND’. This logical combination will result in logic ‘1’ for the rightmost bit position of the single_link port map. Hence, the single_link port map may remain unchanged and the rightmost bit of single_link may indicate by the logic ‘1’ that port 0 may not be pruned. The loop_discovery frame sent from port 2 of switch A 502, may be received at port 0 of switch D 504 and then forwarded on port 1 of switch D 504. Since the loop_discovery frame sent from port 2 of switch A 502 may then be received by port 1 of switch A 502, LP_local_port=p2 may not be equal to the receiving port, p1. Therefore, logic ‘0’ may be combined with the leftmost bit of single_link (‘1’) that may correspond to port 2, by logical ‘AND’. This logical combination will result in logic ‘0’ for the leftmost bit position of the single_link port map, thereby indicating that port 2 is a port that may be pruned. Similarly, the loop_discovery frame sent from port 1 of switch A 502 may be received by port 2 of switch A 502 and since LP_local_port may not be equal to the receiving port, the middle bit of the port map single_link may also be set to logic ‘0’. Therefore, the single_link port map of switch A 502 may be 001 after the received loop_discovery frames may have been evaluated. Since loop_discovery frames from some active ports were received on port 0, port 1 and port 2, the loop_port map will be set to 111, indicating that port 2, port 1, port 0 are in a looped condition. By combining the port maps single_link and loop_port, the port map final_prune may be created. The port map final_prune indicates by logic ‘1’ those ports from which one port may be chosen to be disabled. The condition for a ‘1’ in final_prune for a corresponding port may be that the port is in looped condition and the port may not be a single link. Hence, the port map final_prune may be constructed by the following logical combination of the port maps:

  • final_prune=loop_port̂ single_link
  • where ̂ may denote logical ‘AND’ and overlined may denote negated. In the example started above, single_link may be 001 and loop_port may be 111 and the resulting final_prune port map may be 110, indicating that port 2 and port 1 may be disabled. As may be seen from FIG. 5, port 2 and port 1 may however not be disabled at concurrently and hence the port map final_prune may provide a list of ports of which one port may be disabled. For further pruning by disabling ports, a new final_prune map may be constructed, which may account for the changes in network topology due to the previously disabled port.
  • In accordance with an embodiment of the invention, a method and system for a low-complexity spanning tree algorithm in communication networks may comprise preventing loops in a communications network utilizing a distributed sequential algorithm as illustrated in FIG. 2, FIG. 3 and FIG. 4 and in which there is a single token, as discussed in FIG. 2. Only a network node in possession of this single token may disable a network port, as shown in step 212 of FIG. 2. As shown in FIG. 1, a spanning tree may be generated based on loop prevention. The network ports that may be disabled may be chosen from a port map, where the port map may be obtained by combining a port map identifying ports that are connected to loops with a port map indicating network ports that are to remain enabled. This is illustrated in FIG. 3 and FIG. 4. The network ports that are to remain enabled may comprise single link ports, as shown, for example, in steps 338, 340 and 438 and 440 in FIG. 3 and FIG. 4. As explained for FIG. 2, the loop prevention may be initiated by a root node and a token may be generated by the root node when completing preventing. Loops may be detected by using loop discovery frames, shown in steps 324 and 424. In FIG. 3 and FIG. 4, there is shown that network nodes may reduce ingress data rate during loop prevention in steps 332 and 432, respectively.
  • Another embodiment of the invention may provide a machine-readable storage, having stored thereon, a computer program having at least one code section executable by a machine, thereby causing the machine to perform the steps as described above for a low-complexity spanning tree algorithm in communication networks.
  • Accordingly, the present invention may be realized in hardware, software, or a combination of hardware and software. The present invention may be realized in a centralized fashion in at least one computer system or in a distributed fashion where different elements are spread across several interconnected computer systems. Any kind of computer system or other apparatus adapted for carrying out the methods described herein is suited. A typical combination of hardware and software may be a general-purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the methods described herein.
  • The present invention may also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods described herein, and which when loaded in a computer system is able to carry out these methods. Computer program in the present context means any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following: a) conversion to another language, code or notation; b) reproduction in a different material form.
  • While the present invention has been described with reference to certain embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted without departing from the scope of the present invention. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the present invention without departing from its scope. Therefore, it is intended that the present invention not be limited to the particular embodiment disclosed, but that the present invention will include all embodiments falling within the scope of the appended claims.

Claims (18)

1. A method for processing signals in a communications system, the method comprising:
preventing loops in a communications network utilizing a distributed sequential algorithm in which there is a single token and only a network node in possession of said single token is capable of disabling a network port.
2. The method according to claim 1, comprising generating a spanning tree based on said preventing.
3. The method according to claim 1, comprising selecting said network port for said disabling based on a port map of said network node.
4. The method according to claim 3, comprising generating said port map by combining a port map identifying network ports that connect to said loops with a port map that indicates network ports that are to remain enabled.
5. The method according to claim 4, wherein said network ports that are to remain enabled comprise single link ports.
6. The method according to claim 1, wherein a root node initiates said preventing.
7. The method according to claim 6, comprising generating a token by said root node when said root node has completed said preventing.
8. The method according to claim 1, comprising detecting of said loops is achieved using loop discovery frames.
9. The method according to claim 1, wherein said network node reduces an ingress data rate during said preventing of said loops.
10. A system for processing signals in a communications system, the system comprising:
one or more circuits that prevents loops in a communications network utilizing a distributed sequential algorithm in which there is a single token and only a network node in possession of said single token is capable of disabling a network port.
11. The system according to claim 10, wherein said one or more circuits generates a spanning tree based on said preventing.
12. The method according to claim 10, wherein said one or more circuits selects said network port for said disabling based on a port map of said network node.
13. The method according to claim 12, wherein said one or more circuits generates said port map by combining a port map identifying network ports that connect to said loops with a port map that indicates network ports that are to remain enabled.
14. The method according to claim 13, wherein said network ports that are to remain enabled comprise single link ports.
15. The method according to claim 10, wherein a root node initiates said preventing.
16. The method according to claim 15, wherein said one or more circuits generates a token by said root node when said root node has completed said preventing.
17. The method according to claim 10, wherein said one or more circuits detects said loops by using loop discovery frames.
18. The method according to claim 10, wherein said network node reduces an ingress data rate during said preventing of said loops.
US11/675,374 2007-02-15 2007-02-15 Method and system for a low-complexity spanning tree algorithm in communication networks Active 2030-02-01 US8902793B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/675,374 US8902793B2 (en) 2007-02-15 2007-02-15 Method and system for a low-complexity spanning tree algorithm in communication networks

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/675,374 US8902793B2 (en) 2007-02-15 2007-02-15 Method and system for a low-complexity spanning tree algorithm in communication networks

Publications (2)

Publication Number Publication Date
US20080198769A1 true US20080198769A1 (en) 2008-08-21
US8902793B2 US8902793B2 (en) 2014-12-02

Family

ID=39706558

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/675,374 Active 2030-02-01 US8902793B2 (en) 2007-02-15 2007-02-15 Method and system for a low-complexity spanning tree algorithm in communication networks

Country Status (1)

Country Link
US (1) US8902793B2 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090169011A1 (en) * 2007-12-28 2009-07-02 Intel Corporation Apparatus and method for negotiating pairwise master key for securing peer links in wireless mesh networks
US20100150029A1 (en) * 2007-05-18 2010-06-17 Yohei Hasegawa Topology specifying method and topology specifying apparatus
WO2017020934A1 (en) * 2015-07-31 2017-02-09 Hewlett-Packard Development Company, L.P. Methods to create logical trees of memory systems
US20170063617A1 (en) * 2015-08-26 2017-03-02 Hariprasad Sudharshan Seamless migration from rapid spanning tree protocol to ethernet ring protection switching protocol
US20180076975A1 (en) * 2016-09-15 2018-03-15 Hariprasad Sudharshan Auto detection and prevention of loop, segmentation and traffic outage in a g.8032 ring network
US20180076974A1 (en) * 2016-09-12 2018-03-15 Davin Michael Colven Seamless migration from multiple spanning tree protocol to ethernet ring protection switching protocol
US10892936B2 (en) * 2014-03-31 2021-01-12 Metaswitch Networks Limited Spanning tree protocol

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6304575B1 (en) * 1998-08-31 2001-10-16 Cisco Technology, Inc. Token ring spanning tree protocol
US6330229B1 (en) * 1998-11-09 2001-12-11 3Com Corporation Spanning tree with rapid forwarding database updates
US20030108050A1 (en) * 1998-11-19 2003-06-12 Black Alistair D. Fibre channel arbitrated loop bufferless switch circuitry to increase bandwidth without significant increase in cost
US7346063B1 (en) * 1998-07-08 2008-03-18 Broadcom Corporation Memory management unit for a network switch

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7346063B1 (en) * 1998-07-08 2008-03-18 Broadcom Corporation Memory management unit for a network switch
US6304575B1 (en) * 1998-08-31 2001-10-16 Cisco Technology, Inc. Token ring spanning tree protocol
US6330229B1 (en) * 1998-11-09 2001-12-11 3Com Corporation Spanning tree with rapid forwarding database updates
US20030108050A1 (en) * 1998-11-19 2003-06-12 Black Alistair D. Fibre channel arbitrated loop bufferless switch circuitry to increase bandwidth without significant increase in cost

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Datta et al., Self-stabilizing Depth-first Token Circulation in Arbitrary Rotted Networks, July 1998, Distributed Computing, 13: 207-218. *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100150029A1 (en) * 2007-05-18 2010-06-17 Yohei Hasegawa Topology specifying method and topology specifying apparatus
US8259619B2 (en) * 2007-05-18 2012-09-04 Nec Corporation Topology specifying method and topology specifying apparatus
US9246679B2 (en) * 2007-12-28 2016-01-26 Intel Corporation Apparatus and method for negotiating pairwise master key for securing peer links in wireless mesh networks
US20090169011A1 (en) * 2007-12-28 2009-07-02 Intel Corporation Apparatus and method for negotiating pairwise master key for securing peer links in wireless mesh networks
US10892936B2 (en) * 2014-03-31 2021-01-12 Metaswitch Networks Limited Spanning tree protocol
US20180143769A1 (en) * 2015-07-31 2018-05-24 Luis Miguel Vaquero Gonzalez Methods to create logical trees of memory systems
WO2017020934A1 (en) * 2015-07-31 2017-02-09 Hewlett-Packard Development Company, L.P. Methods to create logical trees of memory systems
CN107636629A (en) * 2015-07-31 2018-01-26 慧与发展有限责任合伙企业 For the method for the logic tree for creating accumulator system
US9843495B2 (en) * 2015-08-26 2017-12-12 Fujitsu Limited Seamless migration from rapid spanning tree protocol to ethernet ring protection switching protocol
US20170063617A1 (en) * 2015-08-26 2017-03-02 Hariprasad Sudharshan Seamless migration from rapid spanning tree protocol to ethernet ring protection switching protocol
US20180076974A1 (en) * 2016-09-12 2018-03-15 Davin Michael Colven Seamless migration from multiple spanning tree protocol to ethernet ring protection switching protocol
US9923731B1 (en) * 2016-09-12 2018-03-20 Fujitsu Limited Seamless migration from multiple spanning tree protocol to ethernet ring protection switching protocol
US9929878B1 (en) * 2016-09-15 2018-03-27 Fujitsu Limited Auto detection and prevention of loop, segmentation and traffic outage in a G.8032 ring network
US20180076975A1 (en) * 2016-09-15 2018-03-15 Hariprasad Sudharshan Auto detection and prevention of loop, segmentation and traffic outage in a g.8032 ring network

Also Published As

Publication number Publication date
US8902793B2 (en) 2014-12-02

Similar Documents

Publication Publication Date Title
US8139510B2 (en) Optimizations and enhancements to the IEEE RSTP 802.1w implementation
US6202114B1 (en) Spanning tree with fast link-failure convergence
US8902793B2 (en) Method and system for a low-complexity spanning tree algorithm in communication networks
US7233991B2 (en) Self-healing tree network
US7983173B2 (en) System and method for detecting link failures
US6628624B1 (en) Value-added features for the spanning tree protocol
US8811235B2 (en) System and method for assuring the operation of network devices in bridged networks
US6801506B1 (en) Method and apparatus for providing fast spanning tree re-starts
US7983150B2 (en) VPLS failure protection in ring networks
US8953499B2 (en) Method and apparatus for establishing spanning trees
US20100061254A1 (en) Technical Enhancements to STP (IEEE 802.1D) Implementation
US20080019265A1 (en) Systems and methods for configuring a network to include redundant upstream connections using an upstream control protocol
CN101997735A (en) Monocylic network topology reconstruction method and system thereof
WO2002032058A2 (en) Spanning tree alternate routing bridge protocol
US20060253561A1 (en) Method and apparatus for fast re-configuration of a network topology
EP2115949A2 (en) A network bridge and a method of operating thereof
JP2005110253A (en) Method and apparatus for preventing spanning tree loop during traffic overload condition
WO2019149035A9 (en) Method for discovering device in mesh network
CA2310907C (en) Creating a spanning tree of a network including clusters
Nunia et al. Fast and efficient recovery of root node failure in spanning tree routing protocol
KR20060112713A (en) Method of controlling osi(iso) layer-two loops for telecommunication networks
CN108337181B (en) Method and device for managing congestion of switching network
KR100917299B1 (en) Method for eliminating loop supporting linkage with link aggregation in spanning tree
CN110535675B (en) Method and device for multicast fast switching
CN109995541B (en) Multicast data sending method and node equipment

Legal Events

Date Code Title Description
AS Assignment

Owner name: BROADCOM CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TZENG, SHR-JIE;REEL/FRAME:019042/0970

Effective date: 20070215

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH CAROLINA

Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:037806/0001

Effective date: 20160201

Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH

Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:037806/0001

Effective date: 20160201

AS Assignment

Owner name: AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD., SINGAPORE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:041706/0001

Effective date: 20170120

Owner name: AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:041706/0001

Effective date: 20170120

AS Assignment

Owner name: BROADCOM CORPORATION, CALIFORNIA

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:041712/0001

Effective date: 20170119

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551)

Year of fee payment: 4

AS Assignment

Owner name: AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE. LIMITE

Free format text: MERGER;ASSIGNOR:AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD.;REEL/FRAME:047229/0408

Effective date: 20180509

AS Assignment

Owner name: AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE. LIMITE

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE EFFECTIVE DATE PREVIOUSLY RECORDED ON REEL 047229 FRAME 0408. ASSIGNOR(S) HEREBY CONFIRMS THE THE EFFECTIVE DATE IS 09/05/2018;ASSIGNOR:AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD.;REEL/FRAME:047349/0001

Effective date: 20180905

AS Assignment

Owner name: AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE. LIMITE

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE PATENT NUMBER 9,385,856 TO 9,385,756 PREVIOUSLY RECORDED AT REEL: 47349 FRAME: 001. ASSIGNOR(S) HEREBY CONFIRMS THE MERGER;ASSIGNOR:AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD.;REEL/FRAME:051144/0648

Effective date: 20180905

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8